}} |[Azure Monitor](https://learn.microsoft.com/en-us/azure/azure-monitor/overview)
and [Azure Portal](https://azure.microsoft.com/en-us/get-started/azure-portal) |
diff --git a/content/nic/configuration/security.md b/content/nic/configuration/security.md
index ad561cb21..676a3ad56 100644
--- a/content/nic/configuration/security.md
+++ b/content/nic/configuration/security.md
@@ -34,7 +34,7 @@ By default, the ServiceAccount has access to all Secret resources in the cluster
### Configure root filesystem as read-only
{{< call-out "caution" >}}
- This feature is compatible with [NGINX App Protect WAF v5]({{< ref "/nap-waf/v5/" >}}). It is not compatible with [NGINX App Protect WAF v4]({{< ref "/nap-waf/v4/" >}}) or [NGINX App Protect DoS]({{< ref "/nap-dos/" >}}).
+ This feature is compatible with [NGINX App Protect WAF v5]({{< ref "/nap-waf/v5/" >}}). It is not compatible with [NGINX App Protect WAF v4]({{< ref "/nap-waf/v4/" >}}) or [F5 DoS for NGINX]({{< ref "/nap-dos/" >}}).
{{< /call-out >}}
NGINX Ingress Controller is designed to be resilient against attacks in various ways, such as running the service as non-root to avoid changes to files. We recommend setting filesystems on all containers to read-only, this includes `nginx-ingress-controller`, though also includes `waf-enforcer` and `waf-config-mgr` when NGINX App Protect WAFv5 is in use. This is so that the attack surface is further reduced by limiting changes to binaries and libraries.
diff --git a/content/nic/installation/build-nginx-ingress-controller.md b/content/nic/installation/build-nginx-ingress-controller.md
index b9c2b78ef..f829b308d 100644
--- a/content/nic/installation/build-nginx-ingress-controller.md
+++ b/content/nic/installation/build-nginx-ingress-controller.md
@@ -151,14 +151,14 @@ Key targets include:
| _debian-image-plus_ | Builds a Debian-based image with NGINX Plus. |
| _debian-image-nap-plus_ | Builds a Debian-based image with NGINX Plus and the [NGINX App Protect WAF](/nginx-app-protect/) module. |
| _debian-image-nap-v5-plus_ | Builds a Debian-based image with NGINX Plus and the [NGINX App Protect WAF v5](/nginx-app-protect/) module. |
-| _debian-image-dos-plus_ | Builds a Debian-based image with NGINX Plus and the [NGINX App Protect DoS](/nginx-app-protect-dos/) module. |
-| _debian-image-nap-dos-plus_ | Builds a Debian-based image with NGINX Plus, [NGINX App Protect WAF](/nginx-app-protect/) and [NGINX App Protect DoS](/nginx-app-protect-dos/) modules. |
+| _debian-image-dos-plus_ | Builds a Debian-based image with NGINX Plus and the [F5 DoS for NGINX](/nginx-app-protect-dos/) module. |
+| _debian-image-nap-dos-plus_ | Builds a Debian-based image with NGINX Plus, [NGINX App Protect WAF](/nginx-app-protect/) and [F5 DoS for NGINX](/nginx-app-protect-dos/) modules. |
| _ubi-image_ | Builds a UBI-based image with NGINX for [OpenShift](https://www.openshift.com/) clusters. |
| _ubi-image-plus_ | Builds a UBI-based image with NGINX Plus for [OpenShift](https://www.openshift.com/) clusters. |
| _ubi-image-nap-plus_ | Builds a UBI-based image with NGINX Plus and the [NGINX App Protect WAF](/nginx-app-protect/) module for [OpenShift](https://www.openshift.com/) clusters. |
| _ubi-image-nap-v5-plus_ | Builds a UBI-based image with NGINX Plus and the [NGINX App Protect WAF v5](/nginx-app-protect/) module for [OpenShift](https://www.openshift.com/) clusters. |
-| _ubi-image-dos-plus_ | Builds a UBI-based image with NGINX Plus and the [NGINX App Protect DoS](/nginx-app-protect-dos/) module for [OpenShift](https://www.openshift.com/) clusters. |
-| _ubi-image-nap-dos-plus_ | Builds a UBI-based image with NGINX Plus, [NGINX App Protect WAF](/nginx-app-protect/) and the [NGINX App Protect DoS](/nginx-app-protect-dos/) module for [OpenShift](https://www.openshift.com/) clusters.
**Important**: Save your RHEL organization and activation keys in a file named _rhel_license_ at the project root.
For instance:
RHEL_ORGANIZATION=1111111
RHEL_ACTIVATION_KEY=your-key
|
+| _ubi-image-dos-plus_ | Builds a UBI-based image with NGINX Plus and the [F5 DoS for NGINX](/nginx-app-protect-dos/) module for [OpenShift](https://www.openshift.com/) clusters. |
+| _ubi-image-nap-dos-plus_ | Builds a UBI-based image with NGINX Plus, [NGINX App Protect WAF](/nginx-app-protect/) and the [F5 DoS for NGINX](/nginx-app-protect-dos/) module for [OpenShift](https://www.openshift.com/) clusters.
**Important**: Save your RHEL organization and activation keys in a file named _rhel_license_ at the project root.
For instance:
RHEL_ORGANIZATION=1111111
RHEL_ACTIVATION_KEY=your-key
|
{{}}
---
diff --git a/content/nic/installation/installing-nic/installation-with-manifests.md b/content/nic/installation/installing-nic/installation-with-manifests.md
index 8df8e0a53..eb550acb3 100644
--- a/content/nic/installation/installing-nic/installation-with-manifests.md
+++ b/content/nic/installation/installing-nic/installation-with-manifests.md
@@ -71,14 +71,14 @@ To use App Protect DoS, install the App Protect DoS Arbitrator using the provide
### Create optional custom resources
-There are optional CRDs that are necessary if you want to use NGINX App Protect WAF or NGINX App Protect DoS.
+There are optional CRDs that are necessary if you want to use NGINX App Protect WAF or F5 DoS for NGINX.
**NGINX App Protect WAF**:
- `APPolicy`
- `APLogConf`
- `APUserSig`
-**NGINX App Protect DoS**:
+**F5 DoS for NGINX**:
- `APDosPolicy`
- `APDosLogConf`
- `DosProtectedResource`
@@ -96,7 +96,7 @@ There are optional CRDs that are necessary if you want to use NGINX App Protect
kubectl apply -f https://raw.githubusercontent.com/nginx/kubernetes-ingress/v{{< nic-version >}}/deploy/crds-nap-waf.yaml
```
-**NGINX App Protect DoS**:
+**F5 DoS for NGINX**:
```shell
kubectl apply -f https://raw.githubusercontent.com/nginx/kubernetes-ingress/v{{< nic-version >}}/deploy/crds-nap-dos.yaml
@@ -116,7 +116,7 @@ kubectl apply -f config/crd/bases/appprotect.f5.com_appolicies.yaml
kubectl apply -f config/crd/bases/appprotect.f5.com_apusersigs.yaml
```
-**NGINX App Protect DoS**:
+**F5 DoS for NGINX**:
```shell
kubectl apply -f config/crd/bases/appprotectdos.f5.com_apdoslogconfs.yaml
@@ -272,7 +272,7 @@ Connect to ports 80 and 443 using the IP address of any node in the cluster wher
kubectl apply -f https://raw.githubusercontent.com/nginx/kubernetes-ingress/v{{< nic-version >}}/deploy/crds-nap-waf.yaml
```
- 3. Delete custom resource definitions for the NGINX App Protect DoS module:
+ 3. Delete custom resource definitions for the F5 DoS for NGINX module:
```shell
kubectl apply -f https://raw.githubusercontent.com/nginx/kubernetes-ingress/v{{< nic-version >}}/deploy/crds-nap-dos.yaml
```
@@ -290,7 +290,7 @@ kubectl delete -f config/crd/bases/crds.yaml
kubectl apply -f config/crd/bases/crds-nap-waf.yaml
```
-3. Delete custom resource definitions for the NGINX App Protect DoS module:
+3. Delete custom resource definitions for the F5 DoS for NGINX module:
```shell
kubectl apply -f config/crd/bases/crds-nap-dos.yaml
```
diff --git a/content/nic/installation/integrations/app-protect-dos/_index.md b/content/nic/installation/integrations/app-protect-dos/_index.md
index 6f2685996..fc6c0082c 100644
--- a/content/nic/installation/integrations/app-protect-dos/_index.md
+++ b/content/nic/installation/integrations/app-protect-dos/_index.md
@@ -1,6 +1,6 @@
---
-title: NGINX App Protect DoS
-description: Learn how to use NGINX Ingress Controller for Kubernetes with NGINX App Protect DoS.
+title: F5 DoS for NGINX
+description: Learn how to use NGINX Ingress Controller for Kubernetes with F5 DoS for NGINX.
weight: 300
menu:
docs:
diff --git a/content/nic/installation/integrations/app-protect-dos/configuration.md b/content/nic/installation/integrations/app-protect-dos/configuration.md
index 0b39faee8..8ce84d042 100644
--- a/content/nic/installation/integrations/app-protect-dos/configuration.md
+++ b/content/nic/installation/integrations/app-protect-dos/configuration.md
@@ -161,4 +161,4 @@ Then add a reference in the `DosProtectedResource` to the `APDosLogConf`:
## Global Configuration
-NGINX Ingress Controller has a set of global configuration parameters that align with those available in the NGINX App Protect DoS module. See [ConfigMap keys]({{< ref "/nic/configuration/global-configuration/configmap-resource.md#modules" >}}) for the complete list. The App Protect parameters use the `app-protect-dos*` prefix.
+NGINX Ingress Controller has a set of global configuration parameters that align with those available in the F5 DoS for NGINX module. See [ConfigMap keys]({{< ref "/nic/configuration/global-configuration/configmap-resource.md#modules" >}}) for the complete list. The App Protect parameters use the `app-protect-dos*` prefix.
diff --git a/content/nic/installation/integrations/app-protect-dos/dos-protected.md b/content/nic/installation/integrations/app-protect-dos/dos-protected.md
index cfb112eb3..771b84533 100644
--- a/content/nic/installation/integrations/app-protect-dos/dos-protected.md
+++ b/content/nic/installation/integrations/app-protect-dos/dos-protected.md
@@ -7,9 +7,9 @@ nd-product: NIC
nd-docs: DOCS-581
---
-NGINX App Protect DoS protected resource specification
+F5 DoS for NGINX protected resource specification
-{{< call-out "note" >}} This feature is only available using the NGINX Plus [NGINX App Protect DoS Module]({{< ref "/nap-dos/deployment-guide/learn-about-deployment.md" >}}). {{< /call-out >}}
+{{< call-out "note" >}} This feature is only available using the NGINX Plus [F5 DoS for NGINX Module]({{< ref "/nap-dos/deployment-guide/learn-about-deployment.md" >}}). {{< /call-out >}}
## DoS Protected resource specification
@@ -30,12 +30,12 @@ spec:
{{% table %}}
|Field | Description | Type | Required |
| ---| ---| ---| --- |
-|``enable`` | Enables NGINX App Protect DoS, Default value: false. | ``bool`` | No |
+|``enable`` | Enables F5 DoS for NGINX, Default value: false. | ``bool`` | No |
|``name`` | Name of the protected object, max of 63 characters. | ``string`` | Yes |
|``dosAccessLogDest`` | The log destination for the access log with dos log format. Accepted variables are ``:`` or ``stderr``. | ``string`` | No |
|``apDosMonitor.uri`` | The destination to the desired protected object. [App Protect DoS monitor](#dosprotectedresourceapdosmonitor) Default value: None, URL will be extracted from the first request which arrives and taken from "Host" header or from destination ip+port. | ``string`` | No |
|``apDosMonitor.protocol`` | Determines if the server listens on http1 / http2 / grpc / websocket. [App Protect DoS monitor](#dosprotectedresourceapdosmonitor) Default value: http1. | ``enum`` | No |
-|``apDosMonitor.timeout`` | Determines how long (in seconds) should NGINX App Protect DoS wait for a response. [App Protect DoS monitor](#dosprotectedresourceapdosmonitor) Default value: 10 seconds for http1/http2 and 5 seconds for grpc. | ``int64`` | No |
+|``apDosMonitor.timeout`` | Determines how long (in seconds) should F5 DoS for NGINX wait for a response. [App Protect DoS monitor](#dosprotectedresourceapdosmonitor) Default value: 10 seconds for http1/http2 and 5 seconds for grpc. | ``int64`` | No |
|``apDosPolicy`` | The [App Protect DoS policy](#dosprotectedresourceapdospolicy) of the dos. Accepts an optional namespace. | ``string`` | No |
|``dosSecurityLog.enable`` | Enables security log. | ``bool`` | No |
|``dosSecurityLog.apDosLogConf`` | The [App Protect DoS log conf]({{< ref "/nic/installation/integrations/app-protect-dos/configuration.md#app-protect-dos-logs" >}}) resource. Accepts an optional namespace. | ``string`` | No |
@@ -49,7 +49,7 @@ The `apDosPolicy` is a reference (qualified identifier in the format `namespace/
### DosProtectedResource.apDosMonitor
-This is how NGINX App Protect DoS monitors the stress level of the protected object. The monitor requests are sent from localhost (127.0.0.1).
+This is how F5 DoS for NGINX monitors the stress level of the protected object. The monitor requests are sent from localhost (127.0.0.1).
### Invalid DoS Protected resources
diff --git a/content/nic/installation/integrations/app-protect-dos/installation.md b/content/nic/installation/integrations/app-protect-dos/installation.md
index 28c56060d..725a6075c 100644
--- a/content/nic/installation/integrations/app-protect-dos/installation.md
+++ b/content/nic/installation/integrations/app-protect-dos/installation.md
@@ -1,5 +1,5 @@
---
-title: Build NGINX Ingress Controller with NGINX App Protect DoS
+title: Build NGINX Ingress Controller with F5 DoS for NGINX
weight: 100
toc: true
type: how-to
@@ -7,19 +7,19 @@ product: NIC
nd-docs: DOCS-583
---
-This document explains how to build an image for F5 NGINX Ingress Controller with NGINX App Protect DoS from source code.
+This document explains how to build an image for F5 NGINX Ingress Controller with F5 DoS for NGINX from source code.
{{}}If you'd rather not build your own NGINX Ingress Controller image, see the [pre-built image options](#pre-built-images) at the end of this guide.{{}}
## Before you start
-- To use NGINX App Protect DoS with NGINX Ingress Controller, you must have NGINX Plus.
+- To use F5 DoS for NGINX with NGINX Ingress Controller, you must have NGINX Plus.
---
## Prepare the environment {#prepare-environment}
-Get your system ready for building and pushing the NGINX Ingress Controller image with NGINX App Protect DoS.
+Get your system ready for building and pushing the NGINX Ingress Controller image with F5 DoS for NGINX.
1. Sign in to your private registry. Replace `` with the path to your own private registry.
@@ -45,7 +45,7 @@ Get your system ready for building and pushing the NGINX Ingress Controller imag
## Build the image {#build-docker-image}
-Follow these steps to build the NGINX Controller Image with NGINX App Protect DoS.
+Follow these steps to build the NGINX Controller Image with F5 DoS for NGINX.
1. Place your NGINX Plus license files (_nginx-repo.crt_ and _nginx-repo.key_) in the project's root folder. To verify they're in place, run:
@@ -65,7 +65,7 @@ Follow these steps to build the NGINX Controller Image with NGINX App Protect Do
make PREFIX=/nginx-plus-ingress TARGET=download
```
- For example, to build a Debian-based image with NGINX Plus and NGINX App Protect DoS, run:
+ For example, to build a Debian-based image with NGINX Plus and F5 DoS for NGINX, run:
```shell
make debian-image-dos-plus PREFIX=/nginx-plus-ingress TARGET=download
@@ -80,10 +80,10 @@ Follow these steps to build the NGINX Controller Image with NGINX App Protect Do
{{}}
| Makefile Target | Description | Compatible Systems |
|---------------------------|-------------------------------------------------------------------|---------------------|
-| **debian-image-dos-plus** | Builds a Debian-based image with NGINX Plus and the [NGINX App Protect DoS](/nginx-app-protect-dos/) module. | Debian |
-| **debian-image-nap-dos-plus** | Builds a Debian-based image with NGINX Plus, [NGINX App Protect DoS](/nginx-app-protect-dos/), and [NGINX App Protect WAF](/nginx-app-protect/). | Debian |
-| **ubi-image-dos-plus** | Builds a UBI-based image with NGINX Plus and the [NGINX App Protect DoS](/nginx-app-protect-dos/) module. | OpenShift |
-| **ubi-image-nap-dos-plus** | Builds a UBI-based image with NGINX Plus, [NGINX App Protect DoS](/nginx-app-protect-dos/), and [NGINX App Protect WAF](/nginx-app-protect/). | OpenShift |
+| **debian-image-dos-plus** | Builds a Debian-based image with NGINX Plus and the [F5 DoS for NGINX](/nginx-app-protect-dos/) module. | Debian |
+| **debian-image-nap-dos-plus** | Builds a Debian-based image with NGINX Plus, [F5 DoS for NGINX](/nginx-app-protect-dos/), and [NGINX App Protect WAF](/nginx-app-protect/). | Debian |
+| **ubi-image-dos-plus** | Builds a UBI-based image with NGINX Plus and the [F5 DoS for NGINX](/nginx-app-protect-dos/) module. | OpenShift |
+| **ubi-image-nap-dos-plus** | Builds a UBI-based image with NGINX Plus, [F5 DoS for NGINX](/nginx-app-protect-dos/), and [NGINX App Protect WAF](/nginx-app-protect/). | OpenShift |
{{}}
@@ -94,7 +94,7 @@ Follow these steps to build the NGINX Controller Image with NGINX App Protect Do
## Push the image to your private registry
-Once you've successfully built the NGINX Ingress Controller image with NGINX App Protect DoS, the next step is to upload it to your private Docker registry. This makes the image available for deployment to your Kubernetes cluster.
+Once you've successfully built the NGINX Ingress Controller image with F5 DoS for NGINX, the next step is to upload it to your private Docker registry. This makes the image available for deployment to your Kubernetes cluster.
To upload the image, run the following command. If you're using a custom tag, add `TAG=your-tag` to the end of the command. Replace `` with your private registry's path.
@@ -180,7 +180,7 @@ kubectl apply -f config/crd/bases/appprotectdos.f5.com_dosprotectedresources.yam
### Helm Chart
-The App Protect DoS Arbitrator can be installed using the [NGINX App Protect DoS Helm Chart](https://github.com/nginxinc/nap-dos-arbitrator-helm-chart).
+The App Protect DoS Arbitrator can be installed using the [F5 DoS for NGINX Helm Chart](https://github.com/nginxinc/nap-dos-arbitrator-helm-chart).
If you have the NGINX Helm Repository already added, you can install the App Protect DoS Arbitrator by running the following command:
```shell
@@ -206,9 +206,9 @@ Alternatively, you can install the App Protect DoS Arbitrator using the YAML man
---
-## Enable NGINX App Protect DoS module
+## Enable F5 DoS for NGINX module
-To enable the NGINX App Protect DoS Module:
+To enable the F5 DoS for NGINX Module:
- Add the `enable-app-protect-dos` [command-line argument]({{< ref "/nic/configuration/global-configuration/command-line-arguments.md#cmdoption-enable-app-protect-dos" >}}) to your Deployment or DaemonSet file.
diff --git a/content/nic/installation/integrations/app-protect-dos/troubleshoot-app-protect-dos.md b/content/nic/installation/integrations/app-protect-dos/troubleshoot-app-protect-dos.md
index 323c2d53e..4d23b1a44 100644
--- a/content/nic/installation/integrations/app-protect-dos/troubleshoot-app-protect-dos.md
+++ b/content/nic/installation/integrations/app-protect-dos/troubleshoot-app-protect-dos.md
@@ -1,5 +1,5 @@
---
-title: Troubleshoot NGINX App Protect DoS
+title: Troubleshoot F5 DoS for NGINX
toc: true
weight: 400
nd-content-type: how-to
diff --git a/content/nic/installation/integrations/app-protect-waf-v5/installation.md b/content/nic/installation/integrations/app-protect-waf-v5/installation.md
index 207b8bc54..18a5478c8 100644
--- a/content/nic/installation/integrations/app-protect-waf-v5/installation.md
+++ b/content/nic/installation/integrations/app-protect-waf-v5/installation.md
@@ -92,7 +92,7 @@ Create Docker image for NGINX Ingress Controller (Alpine with NGINX Plus, NGINX
| **alpine-image-nap-v5-plus-fips** | Builds a Alpine-based image with NGINX Plus and the [NGINX App Protect WAF v5](/nginx-app-protect-waf/v5/) module with FIPS. | Alpine |
| **debian-image-nap-v5-plus** | Builds a Debian-based image with NGINX Plus and the [NGINX App Protect WAF v5](/nginx-app-protect-waf/v5/) module. | Debian |
| **ubi-image-nap-v5-plus** | Builds a UBI-based image with NGINX Plus and the [NGINX App Protect WAF v5](/nginx-app-protect-waf/v5/) module. | OpenShift |
-| **ubi-image-nap-dos-v5-plus** | Builds a UBI-based image with NGINX Plus, [NGINX App Protect WAF v5](/nginx-app-protect-waf/v5/), and [NGINX App Protect DoS](/nginx-app-protect-dos/). | OpenShift |
+| **ubi-image-nap-dos-v5-plus** | Builds a UBI-based image with NGINX Plus, [NGINX App Protect WAF v5](/nginx-app-protect-waf/v5/), and [F5 DoS for NGINX](/nginx-app-protect-dos/). | OpenShift |
{{}}
@@ -479,7 +479,7 @@ Add `readOnlyRootFilesystem` to the `waf-enforcer` container and set value to `t
### Enable NGINX App Protect WAF module
-To enable the NGINX App Protect DoS Module:
+To enable the F5 DoS for NGINX Module:
- Add the `enable-app-protect` [command-line argument]({{< ref "/nic/configuration/global-configuration/command-line-arguments.md#cmdoption-enable-app-protect" >}}) to your Deployment or DaemonSet file.
diff --git a/content/nic/installation/integrations/app-protect-waf/installation.md b/content/nic/installation/integrations/app-protect-waf/installation.md
index d149c3b1b..68664a214 100644
--- a/content/nic/installation/integrations/app-protect-waf/installation.md
+++ b/content/nic/installation/integrations/app-protect-waf/installation.md
@@ -56,7 +56,7 @@ Follow these steps to build the NGINX Controller Image with NGINX App Protect WA
make PREFIX=/nginx-plus-ingress TARGET=download
```
- For example, to build a Debian-based image with NGINX Plus and NGINX App Protect DoS, run:
+ For example, to build a Debian-based image with NGINX Plus and F5 DoS for NGINX, run:
```shell
make debian-image-dos-plus PREFIX=/nginx-plus-ingress TARGET=download
@@ -72,9 +72,9 @@ Follow these steps to build the NGINX Controller Image with NGINX App Protect WA
| Makefile Target | Description | Compatible Systems |
|---------------------------|-------------------------------------------------------------------|---------------------|
| **debian-image-nap-plus** | Builds a Debian-based image with NGINX Plus and the [NGINX App Protect WAF](/nginx-app-protect-waf/) module. | Debian |
-| **debian-image-nap-dos-plus** | Builds a Debian-based image with NGINX Plus, [NGINX App Protect WAF](/nginx-app-protect-waf/), and [NGINX App Protect DoS](/nginx-app-protect-dos/) | Debian |
+| **debian-image-nap-dos-plus** | Builds a Debian-based image with NGINX Plus, [NGINX App Protect WAF](/nginx-app-protect-waf/), and [F5 DoS for NGINX](/nginx-app-protect-dos/) | Debian |
| **ubi-image-nap-plus** | Builds a UBI-based image with NGINX Plus and the [NGINX App Protect WAF](/nginx-app-protect-waf/) module. | OpenShift |
-| **ubi-image-nap-dos-plus** | Builds a UBNI-based image with NGINX Plus, [NGINX App Protect WAF](/nginx-app-protect-waf/), and [NGINX App Protect DoS](/nginx-app-protect-dos/). | OpenShift |
+| **ubi-image-nap-dos-plus** | Builds a UBNI-based image with NGINX Plus, [NGINX App Protect WAF](/nginx-app-protect-waf/), and [F5 DoS for NGINX](/nginx-app-protect-dos/). | OpenShift |
{{}}
@@ -199,7 +199,7 @@ volumeMounts:
## Enable NGINX App Protect WAF module
-To enable the NGINX App Protect DoS Module:
+To enable the F5 DoS for NGINX Module:
- Add the `enable-app-protect` [command-line argument]({{< ref "/nic/configuration/global-configuration/command-line-arguments.md#cmdoption-enable-app-protect" >}}) to your Deployment or DaemonSet file.
diff --git a/content/nic/installation/nic-images/registry-download.md b/content/nic/installation/nic-images/registry-download.md
index c37c00e05..5cc20429b 100644
--- a/content/nic/installation/nic-images/registry-download.md
+++ b/content/nic/installation/nic-images/registry-download.md
@@ -9,7 +9,7 @@ nd-docs: DOCS-605
This page describes how to download an F5 NGINX Plus Ingress Controller image from the official F5 Docker registry.
-The F5 Registry images include versions with NGINX App Protect WAF and NGINX App Protect DoS.
+The F5 Registry images include versions with NGINX App Protect WAF and F5 DoS for NGINX.
## Before you begin
@@ -65,13 +65,13 @@ Replace `` with the specific version you need, for example, `{{< ni
docker pull private-registry.nginx.com/nap/waf-enforcer:
```
-- For NGINX Plus Ingress Controller with NGINX App Protect DoS, run:
+- For NGINX Plus Ingress Controller with F5 DoS for NGINX, run:
```shell
docker pull private-registry.nginx.com/nginx-ic-dos/nginx-plus-ingress:
```
-- For NGINX Plus Ingress Controller with NGINX App Protect WAF and NGINX App Protect DoS, run:
+- For NGINX Plus Ingress Controller with NGINX App Protect WAF and F5 DoS for NGINX, run:
```shell
docker pull private-registry.nginx.com/nginx-ic-nap-dos/nginx-plus-ingress:
@@ -166,7 +166,7 @@ After pulling the image, tag it and upload it to your private registry.
docker push /nap/waf-enforcer:
```
- - For NGINX Controller with NGINX App Protect DoS, run:
+ - For NGINX Controller with F5 DoS for NGINX, run:
```shell
docker tag private-registry.nginx.com/nginx-ic-dos/nginx-plus-ingress: /nginx-ic-dos/nginx-plus-ingress:
diff --git a/content/nic/logging-and-monitoring/status-page.md b/content/nic/logging-and-monitoring/status-page.md
index 8d7c42983..4cfda9d50 100644
--- a/content/nic/logging-and-monitoring/status-page.md
+++ b/content/nic/logging-and-monitoring/status-page.md
@@ -13,7 +13,7 @@ NGINX comes with a status page that reports basic metrics about NGINX called the
NGINX Plus comes with a [dashboard]({{< ref "/nginx/admin-guide/monitoring/live-activity-monitoring.md" >}}) that reports key load-balancing and performance metrics.
-NGINX App Protect DoS comes with a [dashboard]({{< ref "/nap-dos/monitoring/live-activity-monitoring.md" >}}) that shows the status and information of the protected objects.
+F5 DoS for NGINX comes with a [dashboard]({{< ref "/nap-dos/monitoring/live-activity-monitoring.md" >}}) that shows the status and information of the protected objects.
This doc shows how to get access to the stub status/dashboard.
## Accessing Stub Status
diff --git a/content/nic/releases.md b/content/nic/releases.md
index c84783b58..3b30b224a 100644
--- a/content/nic/releases.md
+++ b/content/nic/releases.md
@@ -1121,7 +1121,7 @@ We will provide technical support for NGINX Ingress Controller on any Kubernetes
- Update NGINX Plus version to R28.
- Update NGINX App Protect WAF version to 4.0.
-- Update NGINX App Protect DoS version to 3.1.
+- Update F5 DoS for NGINX version to 3.1.
### Upgrade
@@ -1456,7 +1456,7 @@ We will provide technical support for NGINX Ingress Controller on any Kubernetes
### Overview
-- Support for NGINX App Protect Denial of Service protection with NGINX Ingress Controller. More information about [NGINX App Protect DoS](https://www.nginx.com/products/nginx-app-protect/denial-of-service/). Examples for configuring NGINX App Protect DoS with NGINX Ingress Controller can be found [here](https://github.com/nginx/kubernetes-ingress/tree/v2.1.1/examples/appprotect-dos).
+- Support for NGINX App Protect Denial of Service protection with NGINX Ingress Controller. More information about [F5 DoS for NGINX](https://www.nginx.com/products/nginx-app-protect/denial-of-service/). Examples for configuring F5 DoS for NGINX with NGINX Ingress Controller can be found [here](https://github.com/nginx/kubernetes-ingress/tree/v2.1.1/examples/appprotect-dos).
- Full support for gRPC services using the NGINX Ingress Controller [VirtualServer and VirtualServerRoute]({{< ref "/nic/configuration/virtualserver-and-virtualserverroute-resources.md" >}}) custom resource definitions. This makes configuring and supporting gRPC services much easier, giving a simple YAML configuration and removing the need for snippets. Resource definition examples for gRPC can be found [here](https://github.com/nginx/kubernetes-ingress/tree/v2.1.1/examples/custom-resources/grpc-upstreams).
@@ -1468,7 +1468,7 @@ More about the [NGINX Plus mandatory and persistent health check features]({{< r
### Features
- [2251](https://github.com/nginx/kubernetes-ingress/pull/2251) Enable setting mandatory and persistent in upstream healthchecks in VS and VSR.
-- [2241](https://github.com/nginx/kubernetes-ingress/pull/2241) Add support for NGINX App Protect DoS.
+- [2241](https://github.com/nginx/kubernetes-ingress/pull/2241) Add support for F5 DoS for NGINX.
- [2200](https://github.com/nginx/kubernetes-ingress/pull/2200) Add Alpine image with OpenTracing.
- [2178](https://github.com/nginx/kubernetes-ingress/pull/2178) Support healthchecks in gRPC upstreams.
- [2110](https://github.com/nginx/kubernetes-ingress/pull/2110) Support gRPC in the Upstreams of the virtual server resources. Particular thanks to [Chiyu Zhong](https://github.com/CatTail) for all their work.
diff --git a/content/nic/technical-specifications.md b/content/nic/technical-specifications.md
index b493ac7e3..fa9f9f08b 100644
--- a/content/nic/technical-specifications.md
+++ b/content/nic/technical-specifications.md
@@ -74,12 +74,12 @@ NGINX Plus images are available through the F5 Container registry `private-regis
|Debian-based image | ``debian:12-slim`` | NJS (NGINX JavaScript)
OpenTelemetry | `nginx-ic/nginx-plus-ingress:{{< nic-version >}}` | arm64
amd64 |
|Debian-based image with NGINX App Protect WAF | ``debian:12-slim`` | NGINX App Protect WAF
NJS (NGINX JavaScript)
OpenTelemetry | `nginx-ic-nap/nginx-plus-ingress:{{< nic-version >}}` | amd64 |
|Debian-based image with NGINX App Protect WAF v5 | ``debian:12-slim`` | NGINX App Protect WAF v5
NJS (NGINX JavaScript)
OpenTelemetry | `nginx-ic-nap-v5/nginx-plus-ingress:{{< nic-version >}}` | amd64 |
-|Debian-based image with NGINX App Protect DoS | ``debian:12-slim`` | NGINX App Protect DoS
NJS (NGINX JavaScript)
OpenTelemetry | `nginx-ic-dos/nginx-plus-ingress:{{< nic-version >}}` | amd64 |
+|Debian-based image with F5 DoS for NGINX | ``debian:12-slim`` | F5 DoS for NGINX
NJS (NGINX JavaScript)
OpenTelemetry | `nginx-ic-dos/nginx-plus-ingress:{{< nic-version >}}` | amd64 |
|Debian-based image with NGINX App Protect WAF and DoS | ``debian:12-slim`` | NGINX App Protect WAF and DoS
NJS (NGINX JavaScript)
OpenTelemetry | `nginx-ic-nap-dos/nginx-plus-ingress:{{< nic-version >}}` | amd64 |
|Ubi-based image | ``redhat/ubi9-minimal`` | NJS (NGINX JavaScript)
OpenTelemetry | `nginx-ic/nginx-plus-ingress:{{< nic-version >}}-ubi` | arm64
amd64 |
|Ubi-based image with NGINX App Protect WAF | ``redhat/ubi9`` | NGINX App Protect WAF
NJS (NGINX JavaScript)
OpenTelemetry | `nginx-ic-nap/nginx-plus-ingress:{{< nic-version >}}-ubi` | amd64 |
|Ubi-based image with NGINX App Protect WAF v5 | ``redhat/ubi9`` | NGINX App Protect WAF v5
NJS (NGINX JavaScript)
OpenTelemetry | `nginx-ic-nap-v5/nginx-plus-ingress:{{< nic-version >}}-ubi` | amd64 |
-|Ubi-based image with NGINX App Protect DoS | ``redhat/ubi8`` | NGINX App Protect DoS
NJS (NGINX JavaScript)
OpenTelemetry | `nginx-ic-dos/nginx-plus-ingress:{{< nic-version >}}-ubi` | amd64 |
+|Ubi-based image with F5 DoS for NGINX | ``redhat/ubi8`` | F5 DoS for NGINX
NJS (NGINX JavaScript)
OpenTelemetry | `nginx-ic-dos/nginx-plus-ingress:{{< nic-version >}}-ubi` | amd64 |
|Ubi-based image with NGINX App Protect WAF and DoS | ``redhat/ubi8`` | NGINX App Protect WAF and DoS
NJS (NGINX JavaScript)
OpenTelemetry | `nginx-ic-nap-dos/nginx-plus-ingress:{{< nic-version >}}-ubi` | amd64 |
{{% /bootstrap-table %}}
diff --git a/content/nim/_index.md b/content/nim/_index.md
index c46d14a2e..74cbc7561 100644
--- a/content/nim/_index.md
+++ b/content/nim/_index.md
@@ -110,7 +110,7 @@ NGINX Instance Manager is part of NGINX One, which includes [NGINX One component
{{< card title="NGINX App Protect WAF" titleUrl="/nginx-app-protect-waf" brandIcon="NGINX-App-Protect-WAF-product-icon.png">}}
Lightweight, high-performance, advanced protection against Layer 7 attacks on your apps and APIs.
{{ card >}}
- {{< card title="NGINX App Protect DoS" titleUrl="/nginx-app-protect-dos" brandIcon="NGINX-App-Protect-DoS-product-icon.png">}}
+ {{< card title="F5 DoS for NGINX" titleUrl="/nginx-app-protect-dos" brandIcon="NGINX-App-Protect-DoS-product-icon.png">}}
Defend, adapt, and mitigate against Layer 7 denial-of-service attacks on your apps and APIs.
{{ card >}}
{{ card-section >}}
diff --git a/content/solutions/about-subscription-licenses.md b/content/solutions/about-subscription-licenses.md
index 8aba61588..0faf57e5b 100644
--- a/content/solutions/about-subscription-licenses.md
+++ b/content/solutions/about-subscription-licenses.md
@@ -207,9 +207,9 @@ For details on installing or upgrading NGINX App Protect WAF, visit the guide fo
- [NGINX App Protect WAF v4 installation guide]({{< ref "/nap-waf/v4/admin-guide/install.md" >}})
- [NGINX App Protect WAF v5 installation guide]({{< ref "/nap-waf/v5/admin-guide/install.md" >}})
-### NGINX App Protect DoS
+### F5 DoS for NGINX
-For detailed instructions on installing or upgrading NGINX App Protect DoS, visit the [NGINX App Protect DoS installation guide]({{< ref "/nap-dos/deployment-guide/learn-about-deployment.md" >}}).
+For detailed instructions on installing or upgrading F5 DoS for NGINX, visit the [F5 DoS for NGINX installation guide]({{< ref "/nap-dos/deployment-guide/learn-about-deployment.md" >}}).
## Watch instructional videos
diff --git a/content/waf/_index.md b/content/waf/_index.md
new file mode 100644
index 000000000..36f6fdaf2
--- /dev/null
+++ b/content/waf/_index.md
@@ -0,0 +1,39 @@
+---
+# The title is the product name
+title: "F5 WAF for NGINX"
+# The URL is the base of the deployed path, becoming "docs.nginx.com//"
+url: /waf/
+# The cascade directive applies its nested parameters down the page tree until overwritten
+cascade:
+ # The logo file is resolved from the theme, in the folder /static/images/icons/
+ logo: NGINX-App-Protect-WAF-product-icon.svg
+# The subtitle displays directly underneath the heading of a given page
+nd-subtitle: A lightweight, high-performance web application firewall for protecting APIs and applications
+# Indicates that this is a custom landing page
+nd-landing-page: true
+# Types have a 1:1 relationship with Hugo archetypes, so you shouldn't need to change this
+nd-content-type: landing-page
+# Intended for internal catalogue and search, case sensitive:
+# Agent, N4Azure, NIC, NIM, NGF, NAP-DOS, NAP-WAF, NGINX One, NGINX+, Solutions, Unit
+nd-product: NAP-WAF
+---
+
+## About
+
+Defend your applications and APIs with a software security solution that seamlessly integrates into DevOps environments as a lightweight web application firewall (WAF), layer 7 denial-of-service (DoS) protection, bot protection, API security, and threat intelligence services.
+
+## Featured content
+
+{{}}
+ {{}}
+ {{}}
+ Learn about how F5 WAF for NGINX works and how it can be used to protect your applications
+ {{}}
+ {{}}
+ Explore the methods available to deploy F5 WAF for NGINX in your environment
+ {{}}
+ {{}}
+ Review the latest changes and improvements to F5 WAF for NGINX
+ {{}}
+ {{}}
+{{}}
diff --git a/content/waf/changelog.md b/content/waf/changelog.md
new file mode 100644
index 000000000..e8ffa95de
--- /dev/null
+++ b/content/waf/changelog.md
@@ -0,0 +1,159 @@
+---
+# We use sentence case and present imperative tone
+title: "Changelog"
+# Weights are assigned in increments of 100: determines sorting order
+weight: 800
+# Creates a table of contents and sidebar, useful for large documents
+toc: true
+# Types have a 1:1 relationship with Hugo archetypes, so you shouldn't need to change this
+nd-content-type: reference
+# Intended for internal catalogue and search, case sensitive:
+# Agent, N4Azure, NIC, NIM, NGF, NAP-DOS, NAP-WAF, NGINX One, NGINX+, Solutions, Unit
+nd-product: NAP-WAF
+---
+
+{{< call-out "warning" "Information architecture note" >}}
+
+The design intention for this page is to act as a single reference point for changes between each release. "Changelog" is the term being adopted across the entire NGINX product ecosystem.
+
+Since both versions of NGINX App Protect WAF are released at the same time, they can be stored in the same note. Change items for only one specific version are explicitly annotated when necessary.
+
+Updating the content of this page will likely be automated in the future, following some procedural changes to how tickets are managed within JIRA.
+
+{{ call-out>}}
+
+This changelog lists all of the information for F5 WAF for NGINX releases in 2025.
+
+For older releases, check the changelogs for previous years: [2024](), [2023]().
+
+## NGINX App Protect WAF 5.7 / 4.15
+
+### New features
+
+- Added support for Rocky Linux 9
+- Added support for IP Intelligence
+- Added support for Override rules for IP Address Lists
+
+### Important notes
+
+- Ubuntu 20.04 is no longer supported
+- (12447) Upgrade libk5crypto3 package
+- (12520) Upgrade Go compiler to 1.23.8
+
+### Resolved issues
+
+- (12527) Remove CPAN - installed certs and source files
+- (11112) Remove systemd/init.d leftovers in NAP WAF v5 pkgs
+- (12400) Cookie attributes are not added to a TS cookie when there is more than one TS cookie
+- (12498) Undefined behavior when using huge XFF
+- (12731) Multiple clean_resp_reset internal error messages in logs when loading NAP
+
+### 5.7 packages
+
+#### NGINX Open Source
+
+| Distribution name | Package file |
+|--------------------------|-------------------------------------------------------------------|
+| Alpine 3.19 | _app-protect-module-oss-1.27.4+5.442.0-r1.apk_ |
+| Amazon Linux 2023 | _app-protect-module-oss-1.27.4+5.442.0-1.amzn2023.ngx.x86_64.rpm_ |
+| Debian 11 | _app-protect-module-oss_1.27.4+5.442.0-1\~bullseye_amd64.deb_ |
+| Debian 12 | _app-protect-module-oss_1.27.4+5.442.0-1\~bookworm_amd64.deb_ |
+| Oracle Linux 8.1 | _app-protect-module-oss-1.27.4+5.442.0-1.el8.ngx.x86_64.rpm_ |
+| Ubuntu 22.04 | _app-protect-module-oss_1.27.4+5.442.0-1\~jammy_amd64.deb_ |
+| Ubuntu 24.04 | _app-protect-module-oss_1.27.4+5.442.0-1\~noble_amd64.deb_ |
+| RHEL 8 and Rocky Linux 8 | _app-protect-module-oss-1.27.4+5.442.0-1.el8.ngx.x86_64.rpm_ |
+| RHEL 9 and Rocky Linux 9 | _app-protect-module-oss-1.27.4+5.442.0-1.el9.ngx.x86_64.rpm_ |
+
+#### NGINX Plus
+
+| Distribution name | Package file |
+|--------------------------|----------------------------------------------------------------|
+| Alpine 3.19 | _app-protect-module-plus-34+5.442.0-r1.apk_ |
+| Amazon Linux 2023 | _app-protect-module-plus-34+5.442.0-1.amzn2023.ngx.x86_64.rpm_ |
+| Debian 11 | _app-protect-module-plus_34+5.442.0-1\~bullseye_amd64.deb_ |
+| Debian 12 | _app-protect-module-plus_34+5.442.0-1\~bookworm_amd64.deb_ |
+| Oracle Linux 8.1 | _app-protect-module-plus-34+5.442.0-1.el8.ngx.x86_64.rpm_ |
+| Ubuntu 22.04 | _app-protect-module-plus_34+5.442.0-1\~jammy_amd64.deb_ |
+| Ubuntu 24.04 | _app-protect-module-plus_34+5.442.0-1\~noble_amd64.deb_ |
+| RHEL 8 and Rocky Linux 8 | _app-protect-module-plus-34+5.442.0-1.el8.ngx.x86_64.rpm_ |
+| RHEL 9 and Rocky Linux 9 | _app-protect-module-plus-34+5.442.0-1.el9.ngx.x86_64.rpm_ |
+
+### 4.15 packages
+
+| Distribution name | Package file |
+|--------------------------|----------------------------------------------------|
+| Alpine 3.19 | _app-protect-34.5.442.0-r1.apk_ |
+| Amazon Linux 2023 | _app-protect-34+5.442.0-1.amzn2023.ngx.x86_64.rpm_ |
+| Debian 11 | _app-protect_34+5.442.0-1\~bullseye_amd64.deb_ |
+| Debian 12 | _app-protect_34+5.442.0-1\~bookworm_amd64.deb_ |
+| Oracle Linux 8.1 | _app-protect-34+5.442.0-1.el8.ngx.x86_64.rpm_ |
+| Ubuntu 22.04 | _app-protect_34+5.442.0-1\~jammy_amd64.deb_ |
+| Ubuntu 24.04 | _app-protect_34+5.442.0-1\~noble_amd64.deb_ |
+| RHEL 8 and Rocky Linux 8 | _app-protect-34+5.442.0-1.el8.ngx.x86_64.rpm_ |
+| RHEL 9 and Rocky Linux 9 | _app-protect-34+5.442.0-1.el9.ngx.x86_64.rpm_ |
+
+## NGINX App Protect WAF 5.6 / 4.14
+
+### New features
+
+- Added support for NGINX Plus R34
+- **5.6 Only:** You can now [deploy NGINX App Protect WAF 5+ using a Helm chart]({{< ref "/nap-waf/v5/admin-guide/deploy-with-helm.md">}})
+
+### Important notes
+
+- Alpine 3.17 is no longer supported
+
+### Resolved issues
+
+- Upgraded the Go compiler to 1.23.7
+- (12140) Changed the maximum memory of the XML processing engine to 8GB
+- (12254) A modified YAML file referenced by a JSON policy file causes a reload error when running `nginx -t`
+- (12296) "Violation Bad Unescape" is not enabled by default
+- (12297) "Violation Encoding" is not enabled by default
+
+### 5.6 packages
+
+#### NGINX Open Source
+
+| Distribution name | Package file |
+|--------------------------|-------------------------------------------------------------------|
+| Alpine 3.19 | _app-protect-module-oss-1.27.4+5.342.0-r1.apk_ |
+| Amazon Linux 2023 | _app-protect-module-oss-1.27.4+5.342.0-1.amzn2023.ngx.x86_64.rpm_ |
+| Debian 11 | _app-protect-module-oss_1.27.4+5.342.0-1\~bullseye_amd64.deb_ |
+| Debian 12 | _app-protect-module-oss_1.27.4+5.342.0-1\~bookworm_amd64.deb_ |
+| Oracle Linux 8.1 | _app-protect-module-oss-1.27.4+5.342.0-1.el8.ngx.x86_64.rpm_ |
+| Ubuntu 20.04 | _app-protect-module-oss_1.27.4+5.342.0-1\~focal_amd64.deb_ |
+| Ubuntu 22.04 | _app-protect-module-oss_1.27.4+5.342.0-1\~jammy_amd64.deb_ |
+| Ubuntu 24.04 | _app-protect-module-oss_1.27.4+5.342.0-1\~noble_amd64.deb_ |
+| RHEL 8 and Rocky Linux 8 | _app-protect-module-oss-1.27.4+5.342.0-1.el8.ngx.x86_64.rpm_ |
+| RHEL 9 | _app-protect-module-oss-1.27.4+5.342.0-1.el9.ngx.x86_64.rpm_ |
+
+#### NGINX Plus
+
+| Distribution name | Package file |
+|--------------------------|----------------------------------------------------------------|
+| Alpine 3.19 | _app-protect-module-plus-34+5.342.0-r1.apk_ |
+| Amazon Linux 2023 | _app-protect-module-plus-34+5.342.0-1.amzn2023.ngx.x86_64.rpm_ |
+| Debian 11 | _app-protect-module-plus_34+5.342.0-1\~bullseye_amd64.deb_ |
+| Debian 12 | _app-protect-module-plus_34+5.342.0-1\~bookworm_amd64.deb_ |
+| Oracle Linux 8.1 | _app-protect-module-plus-34+5.342.0-1.el8.ngx.x86_64.rpm_ |
+| Ubuntu 20.04 | _app-protect-module-plus_34+5.342.0-1\~focal_amd64.deb_ |
+| Ubuntu 22.04 | _app-protect-module-plus_34+5.342.0-1\~jammy_amd64.deb_ |
+| Ubuntu 24.04 | _app-protect-module-plus_34+5.342.0-1\~noble_amd64.deb_ |
+| RHEL 8 and Rocky Linux 8 | _app-protect-module-plus-34+5.342.0-1.el8.ngx.x86_64.rpm_ |
+| RHEL 9 | _app-protect-module-plus-34+5.342.0-1.el9.ngx.x86_64.rpm_ |
+
+### 4.14 packages
+
+| Distribution name | Package file |
+|--------------------------|----------------------------------------------------|
+| Alpine 3.19 | _app-protect-34.5.342.0-r1.apk_ |
+| Amazon Linux 2023 | _app-protect-34+5.342.0-1.amzn2023.ngx.x86_64.rpm_ |
+| Debian 11 | _app-protect_34+5.342.0-1\~bullseye_amd64.deb_ |
+| Debian 12 | _app-protect_34+5.342.0-1\~bookworm_amd64.deb_ |
+| Oracle Linux 8.1 | _app-protect-34+5.342.0-1.el8.ngx.x86_64.rpm_ |
+| Ubuntu 20.04 | _app-protect_34+5.342.0-1\~focal_amd64.deb_ |
+| Ubuntu 22.04 | _app-protect_34+5.342.0-1\~jammy_amd64.deb_ |
+| Ubuntu 24.04 | _app-protect_34+5.342.0-1\~noble_amd64.deb_ |
+| RHEL 8 and Rocky Linux 8 | _app-protect-34+5.342.0-1.el8.ngx.x86_64.rpm_ |
+| RHEL 9 | _app-protect-34+5.342.0-1.el9.ngx.x86_64.rpm_ |
\ No newline at end of file
diff --git a/content/waf/features/_index.md b/content/waf/features/_index.md
new file mode 100644
index 000000000..05cb5a884
--- /dev/null
+++ b/content/waf/features/_index.md
@@ -0,0 +1,6 @@
+---
+title: "Features"
+url: /app-protect-waf/features/
+weight: 700
+draft: true
+---
\ No newline at end of file
diff --git a/content/waf/fundamentals/_index.md b/content/waf/fundamentals/_index.md
new file mode 100644
index 000000000..ed0e1f6a7
--- /dev/null
+++ b/content/waf/fundamentals/_index.md
@@ -0,0 +1,5 @@
+---
+title: "Fundamentals"
+url: /app-protect-waf/fundamentals/
+weight: 100
+---
\ No newline at end of file
diff --git a/content/waf/fundamentals/overview.md b/content/waf/fundamentals/overview.md
new file mode 100644
index 000000000..c0839cae4
--- /dev/null
+++ b/content/waf/fundamentals/overview.md
@@ -0,0 +1,38 @@
+---
+# We use sentence case and present imperative tone
+title: "Overview"
+# Weights are assigned in increments of 100: determines sorting order
+weight: 100
+# Creates a table of contents and sidebar, useful for large documents
+toc: false
+# Types have a 1:1 relationship with Hugo archetypes, so you shouldn't need to change this
+nd-content-type: how-to
+# Intended for internal catalogue and search, case sensitive:
+# Agent, N4Azure, NIC, NIM, NGF, NAP-DOS, NAP-WAF, NGINX One, NGINX+, Solutions, Unit
+nd-product: NAP-WAF
+---
+
+{{< call-out "warning" "Information architecture note" >}}
+
+The design intention for this page is to describing what NGINX App Protect is, expanding on the detail from the [landing page]({{< ref "/waf/" >}}).
+
+It is also an opportunity to explain the difference between NGINX App Protect versions, and how integrates with other products in the NGINX ecosystem.
+
+The text here will likely be synthesized from the Overview descriptions at the top of the [Administration Guides]({{< ref "/nap-waf/v4/admin-guide/install.md#overview" >}}), but there's also detail from [F5.com](https://www.f5.com/products/nginx/nginx-app-protect) that can be added.
+
+{{< /call-out >}}
+
+[F5 WAF for NGINX](https://www.f5.com/products/nginx/nginx-app-protect) is an advanced, lightweight and high-performance web application firewall (WAF) for applications and APIs.
+
+It provides protection for the OWASP Top 10, with additional functionality:
+
+- HTTP response inspection and protocol compliance
+- Data schema validation (JSON & XML)
+- Meta character checking
+- Disallowing file types
+
+For more details, see the [Supported security policy features]({{< ref "/waf/fundamentals/technical-specifications.md#supported-security-policy-features">}}).
+
+F5 WAF for NGINX is part of the [NGINX One](https://www.f5.com/products/nginx/one) premium packages and runs natively on [NGINX Plus](https://www.f5.com/products/nginx/nginx-plus) and [NGINX Ingress Controller](https://www.f5.com/products/nginx/nginx-ingress-controller).
+
+It is platform-agnostic and supports deployment options ranging from edge load balancers to individual pods in Kubernetes clusters.
diff --git a/content/waf/fundamentals/technical-specifications.md b/content/waf/fundamentals/technical-specifications.md
new file mode 100644
index 000000000..97e2abbc7
--- /dev/null
+++ b/content/waf/fundamentals/technical-specifications.md
@@ -0,0 +1,83 @@
+---
+# We use sentence case and present imperative tone
+title: "Technical specifications"
+# Weights are assigned in increments of 100: determines sorting order
+weight: 200
+# Creates a table of contents and sidebar, useful for large documents
+toc: true
+# Types have a 1:1 relationship with Hugo archetypes, so you shouldn't need to change this
+nd-content-type: reference
+# Intended for internal catalogue and search, case sensitive:
+# Agent, N4Azure, NIC, NIM, NGF, NAP-DOS, NAP-WAF, NGINX One, NGINX+, Solutions, Unit
+nd-product: NAP-WAF
+---
+
+{{< call-out "warning" "Information architecture note" >}}
+
+The design intention for this page is to act as a single source of truth for supported operating systems and version compatibility.
+
+It follows a design pattern set by other NGINX product sets, showing various compatibility matrices:
+
+- [NGINX Plus]({{< ref "/nginx/technical-specs.md" >}})
+- [NGINX Instance Manager]({{< ref "/nim/fundamentals/tech-specs.md" >}})
+- [NGINX Ingress Controller]({{< ref "/nic/technical-specifications.md" >}})
+
+It is also where information about the [Supported Security Policy Features]({{< ref "/nap-waf/v4/configuration-guide/configuration.md#supported-security-policy-features" >}}) could be referenced, though most of that detail will instead be kept in the new top-level "Policies" section.
+
+{{ call-out>}}
+
+This page outlines the technical specifications for F5 WAF for NGINX, which includes the minimum requirements and supported platforms.
+
+## Supported deployment environments
+
+You can deploy F5 WAF for NGINX in the following environments:
+
+- **Virtual environment** (or bare metal)
+- **Container** (Docker)
+- **Kubernetes**
+
+View the [Install section]({{< ref "/waf/install/" >}}) for information on deploying F5 WAF for NGINX.
+
+## Supported operating systems
+
+| Distribution | Version |
+| ------------------ | ------------ |
+| Alpine Linux | 3.19 |
+| Amazon Linux | 2023 |
+| Debian | 11, 12 |
+| Oracle Linux | 8.1 |
+| Ubuntu | 22.04, 24.04 |
+| RHEL / Rocky Linux | 8, 9 |
+
+For release-specific packages, view the [Changelog]({{< ref "/waf/changelog.md" >}}).
+
+
+### Package dependencies
+
+The F5 WAF for NGINX package has the following dependencies:
+
+| Module name | Description |
+| ------------------------------------------ | ----------- |
+| nginx-plus-module-appprotect | NGINX Plus dynamic module for F5 WAF for NGINX |
+| app-protect-engine | The F5 WAF for NGINX enforcement engine |
+| app-protect-plugin | The F5 WAF for NGINX connector API between the engine and the NGINX Plus dynamic module |
+| app-protect-compiler | The F5 WAF for NGINX enforcement engine compiler agent |
+| app-protect-common | The F5 WAF for NGINX shared libraries package |
+| app-protect-geoip | The F5 WAF for NGINX geolocation update package |
+| app-protect-graphql | The F5 WAF for NGINX shared library package for GraphQL protection |
+| app-protect-attack-signatures | The F5 WAF for NGINX attack signatures update package |
+| app-protect-threat-campaigns | The F5 WAF for NGINX threat campaigns update package |
+| app-protect-bot-signatures | The F5 WAF for NGINX bot signatures update package |
+| app-protect-selinux (**1**) | The prebuilt SELinux policy module for F5 WAF for NGINX |
+| app-protect-ip-intelligence (**1**, **2**) | Necessary for the IP intelligence feature |
+
+1. _Optional dependencies_
+2. _This package needs to be installed separately, and includes a client for downloading and updating the feature's database_
+
+## Supported security policy features
+
+The following security policy features are available with F5 WAF for NGINX.
+
+The names link to additional information in the [Configure policies]({{< ref "/waf/policies/configuration.md" >}}) topic.
+
+{{< include "waf/supported-policy-features.md" >}}
\ No newline at end of file
diff --git a/content/waf/fundamentals/terminology.md b/content/waf/fundamentals/terminology.md
new file mode 100644
index 000000000..3e54e1af8
--- /dev/null
+++ b/content/waf/fundamentals/terminology.md
@@ -0,0 +1,46 @@
+---
+# We use sentence case and present imperative tone
+title: "Terminology"
+# Weights are assigned in increments of 100: determines sorting order
+weight: 300
+# Creates a table of contents and sidebar, useful for large documents
+toc: false
+# Types have a 1:1 relationship with Hugo archetypes, so you shouldn't need to change this
+nd-content-type: reference
+# Intended for internal catalogue and search, case sensitive:
+# Agent, N4Azure, NIC, NIM, NGF, NAP-DOS, NAP-WAF, NGINX One, NGINX+, Solutions, Unit
+nd-product: NAP-WAF
+---
+
+This page defines terminology used when describing functionality of F5 WAF for NGINX.
+
+It assumes you are familiar with various layer 7 (L7) hypertext transfer protocol (HTTP) concepts such as:
+
+- Uniform Resource Identifier (URI)
+- Uniform Resource Location (URL)
+- HTTP methods and status codes
+- HTTP headings, requests, responses, and parameters
+- Cookies
+
+## Terms and definitions
+
+|Term | Definition |
+| ---| --- |
+| Alarm | If selected, the F5 WAF for NGINX system records requests that trigger the violation in the remote log (depending on the settings of the logging profile). |
+| Attack signature | Textual patterns which can be applied to HTTP requests and/or responses by F5 WAF for NGINX to determine if traffic is malicious. For example, the string `